Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 07:47
Static task
static1
Behavioral task
behavioral1
Sample
d16c895519df2f5e1c568b3e42fb7949_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d16c895519df2f5e1c568b3e42fb7949_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d16c895519df2f5e1c568b3e42fb7949_JaffaCakes118.html
-
Size
24KB
-
MD5
d16c895519df2f5e1c568b3e42fb7949
-
SHA1
c8403fab15c21b1029a0f41bb7beb54b0d260169
-
SHA256
f0997b3d0ef735b2e7913d29214e16fdb87b041c404464a19daad8b52f0f785e
-
SHA512
dc47e566bf31663da832cce031e93fd43b4bb3d3581632175087fa0226531799179cf2097442b29b45bdb7735b8ff1ca39d96da5fe98f7a136dab1d6024239ea
-
SSDEEP
192:uwr5b5nk3WWnQjxn5Q/+nQie9NnCnQOkEntycnQTbndnQIGLnLnQttqMBdqnYnQ0:hQ/HGa0+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a7e3310a2b0e6e498bd88e48ec67abf6000000000200000000001066000000010000200000002df198c180d745382dc6e0e6d652fd1dcdd9864c1940f02cace90ab3693eeedd000000000e8000000002000020000000ce6ec3f5bf44a7b8e45473a14b03a53c4aeddf1a15dc73c6953f0006d132c9ed200000007c4ad6d5a96c452102db9b3ce62eceb5636e8d6af94c23c0b8332d207250b97540000000d2dbd858b74e95a103f377256932682ae614b6c56f48534efc5ce0d3841a7634c11d4fbc7ba14e61ce688a7e7f0924228b992972e166944116d922cfcc6a9575 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6D9818A1-6CED-11EF-8B3A-FE6EB537C9A6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431857114" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 2032d343fa00db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3052 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3052 iexplore.exe 3052 iexplore.exe 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE 1472 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3052 wrote to memory of 1472 3052 iexplore.exe 31 PID 3052 wrote to memory of 1472 3052 iexplore.exe 31 PID 3052 wrote to memory of 1472 3052 iexplore.exe 31 PID 3052 wrote to memory of 1472 3052 iexplore.exe 31
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\d16c895519df2f5e1c568b3e42fb7949_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3052 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1472
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fee10fe7b0ea9d253ff596b4b348c4b9
SHA1fc890a569e2d22dd9c7aae87155bd569bab44592
SHA2565d4f5088564e6e420e4762c76a185d51254d8c3e1c709816793e084be304f116
SHA512bfe13571ecb5031f94c1187d2d51e48503d95a7426f4b4a80ff4318276b8759984ea4e8dc4f47bb12a4fecbd5dbf51eb3f6267811ccd5d1d536bab40acc76c97
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f79a049b29e4f15f9310141522df2fae
SHA1d1e50882a11bdc05c950064db63f8fb79c3c029b
SHA2569454ede3dd3ff5a655ea7daa3701671edc019917b70f5b8b27a06ae5142cde34
SHA51238fd78b2bc5217e3a1712bffc75e6d0df1cd6fb10985c7c3c5970b0be985d255bedc2e364460341e637613e06feeba2647fae0e8412f8ee422c876c09836017f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c681c5132360350017487c615435ea12
SHA12aa0d3948550fa419c50f5c77eaaefd7df42eb05
SHA2566d044f7c7c59577bff0ba2cc793123deeeb3dfb4e4ce45835aef1e49b9ea9557
SHA512aa3a3f2eceecfa754b946ff782e121581ccd5ab1e8c1e107411d84c4904e023ff8963c6c2d0019a3411411229ecc9b38f31868cc13dbe8413647b6478ddaf8f9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52d2c9c874fb596228c375595bf5371dc
SHA16dfbccdcaa673cbe7edaa86ed573046c6a70b1f0
SHA2568d00aa179da916ecfa932f95519ff55501650e40a5155780019010ea2a13b4d1
SHA512060cdfd1b93e58ba72e14980b90150aa75e37ee9742a77ccfbad6bda89f57cff8ff2132dfbb63cffc34a831fdfc864defc9888715d00ad0e60b9bd50e1340c08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD551a2a0c00090424699b1822fa786af2c
SHA1753d5070af88b905d21781b750186e51025d4a36
SHA256f5fe9e0ee3d0bdee63fc7b3974e46ba78d13757af0dc69c4060fd10eab2b285f
SHA512b86167b8550a9a8523482efe461edfbfb52e98a98cc1ae4e1d1932aa09e5430846312c53d9c32ac8f80072ce89479e2e67db5165e52358e0192a2e17d3553eb0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ba6c3ef927b974beb847d5836831b132
SHA11cdbad4762d1f6cb8c82010fe6df0c210a68ff4b
SHA2565c68a09d00f18df7db6bba7fd331c85fde14190a9924a38ecc31d1680b61caab
SHA5122b97592b795989d9970836ac0d2b2fc5c43e96234abd7dfcc82e1c748492de494d95292d6e51f2c9e1726d47850b64c8b8a19468b86391adfbd966fd99dc019f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58d2cdf14ada3da45225529cdcff003a2
SHA11a11ca9a08baa0cb6a700af7e82564e2805a750b
SHA2566387b029e700e16d560065fad1af1451000cee812500a13da6e2656c74f23958
SHA512c3729c673c836bb71eeb4bffb2fa05103e8e6cc5b5992e5e33fb37729dd581fd32013da4f5428635eee00e0b417af63c64b2a5f3740a27dfcbfa7ea64f1ee8e0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59f6c016e2c5cb4d99d055e8fe78e7e29
SHA180972fe39e61bd09c31fe099b9779abaa8512408
SHA25674e54522a204f1dce709d41937b185b45d2dc285b294520e061ba6cac75af078
SHA5129f340d24dbf17cb4bf0eb90a6f3b2029fe48ce818fe1a3fbb3ebc19303837053e98a87d58c621bb7b87fe96931381d9a5adfa533dcba883923c053d462e74b16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a06c9249c746416886fded6bd38fb56c
SHA1036542244c28e2812d0aa4bb5ba56d7c6e7cbb5a
SHA25651ec89f1f357a76ad2b661b82d8cbad0bbc5d23a6018385e6e40bd77dfb44978
SHA512731112520c38f1d24e694b50f124f6c1d25274e37a0e3011fd749abc017aa1d3436ea659e545bfdf4881ff668b4ca5f0ee03f9fb5675c07ddd625bbac7c1d6cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f23f0628acb3768f9411348c64087f2e
SHA12e641ab3ebb5226d4def3495456be1a83ecbbda5
SHA25653b7ef0f24d79d10af43e1cbb2035393a1b1a5a236fa05ce2836bcf7ecd5dbf4
SHA5123463ba54e08d890d5edb27634b909eda6bc0dabde48813f4e17f041d79e5ceb62239f89150ec7e460e928c398ba2153d94dbc25a1b33e40df0fc7349efd281ae
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507bf5578030d92ffab12327f0cf0a45d
SHA15656ac315c8073f45d3d5584bdf2d6b180fa0255
SHA256a0fce39201989542c7d137ad5697a583a1f166bf7f5339b9146732d3f3d97798
SHA512866b99d9446e4944f19ea30ba3dbbdd7cea2d63e4ea57b74643e09919822afa2fdb9d999bc966bae41719d124d2502c83ce71a3f2607e48b4b13eb45db0fbb4c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD571fc054feeafaa6e2653ad736fedd3d5
SHA194406d02d379599dae395e6315628859f923fc61
SHA256686de5615111543aafbeec3b359b62359b71e44b53762bb8d84301d1471f91dd
SHA5129616f331ebbf5fc1a52a2c2c03fd485e638e1afa5184f0fc600f7ce3803892b7d5124798661c639b744eec5f4008533a65fe1b1e6de93eeba69d683b46f45977
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d03a71c918fccc063578d3c916912a54
SHA12bef447ef249090d57d3535b63a87d0f390ae2bf
SHA25680ebc860cbbfb2aa27231f2fa81c4a4d06ce10cb4b1b04a3aa1c7714f585fe76
SHA512d8b495f7947a27e563425e03c36e97961e24a39a0a385f26790891537ad65a77d6821cdf368354e06f00edfb28842c813c7d51201f223892b122438acc4a5201
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537eb71e2577a7a93dca418a86d5af061
SHA14c678dc8581b8e5e15be31618e65a1614924bc68
SHA256706e1fa83f675e5d65dbc3090e90e24859cca87646145123f14d21ff21965df5
SHA512b9acdfa6969a158cda77c70e7d940e267a8066ed87664ba89dce1aa37be2a5bbfdc239407b7e37dfb8142a71efcd9f06d8ecb7a90ae6e46beda63a0ec8e8874a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f7dcc89515c5d1dca445b67129e277d0
SHA1653f58092bbb5c4c693466daa1bcaf0918babb74
SHA2560aafa741cfa8d7b1d2ab3dd973b700c9827066de1854a2bfd0a2d2e6e313111c
SHA512d7f8695fb9a6ac37b3e6fe0b52c445027e5418addee6b8a56da33114d269b8bc95a158ee4ade52cf86b93b7c749bd8c71c4934771b2f5d3c822dd1c9b00c2381
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d6ac73dcdfe415f11d3d61842366adc5
SHA167497fcda66f9c404db00e5a28abf5a4df0887aa
SHA256c30c83bb018dbe3b93b72263d578672a62c38c89a3b5977c0b44c7a3ee75135f
SHA512ee74618f136bf1920ef705be094d94c48856507eeaf6042271cd841e223801e5ba081595940c1938ad2832742105478e8810e7a9ea8a640bc7c5cd113bcf1398
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52cb74ad9cabc05d0fcb819f611bf9257
SHA1b247573fc8ddcf7abe9d84589884b0f699136e98
SHA256eeaa1898e2e132414456fc6aa82d582abbd7b47ed3f24f2aa531f7233508c163
SHA512550fd87c60230579849977cdd66caf0da160ea6d4f80eeac04883211ce4759daa1b800c062f739b752b39ae44ea03715b28cb68be9e924a4a52d8a046c034514
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5768a89ee9cbef2584d2fd70ac204bde3
SHA1dd25bae976f23ee8b957b530ada3f72b129b9107
SHA256db8093706fdbfae79c0d63a23dbe954352de6fdeb365bbe5ebe761f298aba867
SHA512110c1eb5d9ec25899386e90cba243992582207ea1a976e1d97c038e08d8a68f36579ec0da72a8faa50c8c72acaa4832c7db1ac00621e957e6d8239090643473f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52605b9536af6b83392199a36c5a209c8
SHA1bbb9585de49d84703ab62d6ce4f50fbac0e47fcd
SHA256ba36b554ae6c68479e289b22b4f0bc4d2240dbcdb6f50d8e528348034dd9b1c6
SHA512725212262bf9d555a71d939d43d08160fedeea1856e8a28a64dc29e5658fc8afd4def97536a630a7bff1af04c632c0382f0edd961ab544dd531331c49ddd46f5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b